Prerequisites
To apply for the BeyondTrust Training, you need to either:
To start with BeyondTrust, you should have basic knowledge of the IAM, databases, SQL, and Unix OS.
Course Curriculum
Topic – 1 Deployment Guide of BeyondInsight
- Software & Hardware Requirements for BeyondInsight
- Configure SSL/TLS Certificates for BeyondInsight
- Integrating BeyondTrust Discovery Scanner with BeyondInsight
- Customizing Privilege Management for Linux & Unix
- Implementing BeyondInsight Analytics & Reporting Solutions
- Configuring Active Directory Bridge with BeyondInsight
- Deploying Endpoint Privilege Management Solutions
- Utilizing BeyondInsight Configuration Tools for Better Setup
- Administering BeyondInsight Licenses and Usage
- Setting Up Windows Authentication for Database Access
- BeyondInsight Upgrades for Seamless Operations
Topic – 2 Password Safe Administration Best Practices
- Install BeyondInsight and learn the Procedures
- System Discovery and Integration Techniques
- Build Functional Accounts & Password Policies
- Onboarding Processes for New Systems
- Optimize System with Smart Rules & Directory Queries
- Design and Implement Access Policies
- Mapping End Users and Groups for Better Access Control
- Efficient Request and Approval & Viewing Processes
- Effectively Managing Managed Accounts
- Strategically Mapping Dedicated Admin Accounts
- Configuring Applications for Enhanced Security
- Management of Service and Database Accounts
- (Appendix A) Deep Security System (DSS) Authentication
- (Appendix B) Optimizing Web Application Configurations